The Ultimate Guide to Malware
2024 edition
Overview
This broad term encompasses all types of software intended to disrupt, compromise, attack or otherwise interfere with the normal operation of computing devices and services. There are many examples of malware (malicious software), from keyloggers and other spyware, to backdoors, viruses, worms, adware and ransomware. Malware developers are generally known as ‘hackers’ and can act in coordinated groups, or as ‘lone sharks’. Most malware is developed with a specific goal in mind, and that goal is usually the extraction of money from targeted organisations or computer users.
Analyst reports
Miercom on Ransomware
Check Point Infinity platform excels in Miercom's secur...
Last month
IDC on Firewall
Check Point launches Quantum Spark to boost cybersecuri...
Last month
IDC on Firewall
Fortinet report reveals cyber threats & defence gaps in...
Last month
Forrester Research on Ransomware
Proofpoint acquires Tessian to bolster AI-driven cybers...
Thu, 28th Dec 2023
FMI on DDoS
8.4% CAGR for DNS security market between 2023 and 2033...
Tue, 21st Mar 2023
Expert columns
By Nils Krumrey of Logpoint
The convergence of endpoint security & automated invest...
Last week
By Jana Dekanovska of CrowdStrike
IWD 2024: Defending against modern adversaries requires...
This month
By Gemma Moore of Cyberis
Take a closer look at your company's software supply ch...
Last month
By Shane Buckley of Gigamon
Why 2024 is the year of scaling security efficiencies
Last month
By Nyuk Loong Kiw of Spark
Combating cybercrime in NZ with a robust cybersecurity ...
Wed, 17th Jan 2024
Top players
You can read more from the top players Check Point Software, Apple, Trend Micro, Kaspersky, and Symantec.
Recent news
About Ransomware
Australia ranks high in global malware detection rates,...
Last week
About Scams
Singtel's SingVerify to tackle scams, boost digital sec...
Last week
About Social Media
Silobreaker launches integration with MITRE ATT&CK
Last week
About IT professionals
Global companies ill-prepared for AI-boosted cyber thre...
Last week
About Remote Working
Security risks plague SMEs in shift to remote working
This month
More news
About Docker
Cado Security uncovers sophisticated Linux malware camp...
This month
About Cyber Threats
AI tools drive rapid surge in sophisticated phishing at...
This month
About Dark web
36m AI & gaming credentials breached, Kaspersky reveals
Last month
About Threat intelligence
Trend Micro dismantles major ransomware group LockBit
Last month
About Cyber attacks
Mandiant uncovers intricate UNC5325 cyber attacks on Iv...
Last month
Even more news
About Cloud Services
Rise in 'quishing' attacks exploits growth in QR code u...
Last month
About Bring Your Own Device
Jamf report highlights poor cyber hygiene in organisati...
Last month
About Social Media
VietCredCare cyber threat rocks Vietnam's social media ...
Last month
About Firewall
Barracuda report highlights rise of high-risk business ...
Last month
About Banking Trojans
Group-IB exposes first iOS trojan stealing facial data ...
Last month
Other guides
You can read other related guides from Cybersecurity, Breach Prevention, Technology Gifts, Firewall, and Advanced Persistent Threat Protection.
Powered by